Static task
static1
Behavioral task
behavioral1
Sample
2a31646fc0bc5c78d222b633e7590657_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a31646fc0bc5c78d222b633e7590657_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
2a31646fc0bc5c78d222b633e7590657_JaffaCakes118
-
Size
2.2MB
-
MD5
2a31646fc0bc5c78d222b633e7590657
-
SHA1
70ffbbd4c7e0ad1943e11a3753c7fc411ae41cb1
-
SHA256
c8c851aa3f2020a2a53b80adcf5fc18f0d8ff66fafc15d21f32a1e8d86c45591
-
SHA512
d45b5c36bc3aac366c450e82556fb2e73fd2fc701db20200812417dfe1dc4a869725699e283a1b3f865278dff4bfe8da8e324c662d5d60cf1565026b96f3ca46
-
SSDEEP
24576:QwZUFLbA7ZPTT3PYC1Az5gQUBGjIx1TnW:QwZpv1I8GjwTW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a31646fc0bc5c78d222b633e7590657_JaffaCakes118
Files
-
2a31646fc0bc5c78d222b633e7590657_JaffaCakes118.exe windows:5 windows x86 arch:x86
0e9624b0b4c826dbad6dbe5cf15398c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyExW
user32
UpdateLayeredWindow
EnumDisplayMonitors
MapDialogRect
DestroyIcon
SetWindowLongW
EqualRect
DrawFocusRect
ClientToScreen
SetCursor
GetPropW
RedrawWindow
BeginPaint
GetDC
DrawIcon
DeleteMenu
RemoveMenu
AppendMenuW
EnableMenuItem
CharNextW
CharUpperW
IsDlgButtonChecked
EndDialog
CreateDialogParamW
kernel32
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapSize
HeapAlloc
OutputDebugStringW
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
IsValidCodePage
GlobalAlloc
LocalFree
VirtualAlloc
HeapReAlloc
HeapFree
GetBinaryTypeW
ExitProcess
FreeEnvironmentStringsW
GetProcessId
GetLastError
IsDebuggerPresent
DeleteCriticalSection
SetEndOfFile
SetCommState
FormatMessageW
OpenFileMappingW
LoadLibraryExW
FindResourceW
GetSystemDirectoryW
GetTempPathW
GetFileAttributesW
FindFirstFileW
BuildCommDCBAndTimeoutsW
GetACP
GetOEMCP
CompareStringW
LCMapStringW
GetThreadLocale
GetStringTypeW
IsProcessorFeaturePresent
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
CreateFileW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
RaiseException
EncodePointer
SetLastError
GetCurrentThreadId
DecodePointer
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetStartupInfoW
GetModuleFileNameW
WriteFile
shlwapi
UrlEscapeW
StrToIntExW
SHAutoComplete
AssocQueryStringW
PathCreateFromUrlW
UrlUnescapeW
PathRemoveBlanksW
PathRemoveBackslashW
PathIsURLW
PathIsRelativeW
PathIsDirectoryW
PathAppendW
PathAddBackslashW
StrRetToBufW
StrRetToStrW
StrCmpIW
StrToIntW
winspool.drv
AddMonitorW
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 332KB - Virtual size: 6.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ioet Size: 715KB - Virtual size: 715KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n9nh Size: 376KB - Virtual size: 375KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dt5d Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sah63 Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ